General

  • Target

    8c6e4c86c216b898f24ff14b417c4369.bin

  • Size

    723KB

  • Sample

    241202-byzerasmgw

  • MD5

    4d8ed3b2bb9423020b560dfd2c006c20

  • SHA1

    f5e6648d7151875ef896669972bb703ce30aa64d

  • SHA256

    0fe2e286f88662cf24eed540b44bb07774af394bd660900fef72ca98d7ec899f

  • SHA512

    6e817d79c2aa8c25a03cd33bde5527a57979b4233a2fe1f40d8dd267999ffef2a730fb16acbaa9504fbf70c6b7e2803a23c57e9cd6417e7a85a66e24bf66ae04

  • SSDEEP

    12288:bGau7EauHd22q7MW/2Hok6c8iPTUEAxHqAhWuNjmyK+PPAAY2zBhuwI3qJfNw:b3uoaOBq7MW/73nvY0KytPAvmhgif6

Malware Config

Targets

    • Target

      858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f.exe

    • Size

      1.6MB

    • MD5

      8c6e4c86c216b898f24ff14b417c4369

    • SHA1

      266e7d01ba11cd7914451c798199596f4d2f7b53

    • SHA256

      858fff104da670b640eff2a93b7fa4b794ae554c30a409864d00f3b7ecc1e09f

    • SHA512

      3f6416bf0b7989b522d399e151cc755783b9b7afe9cde559f8207fad6c043e24f85b22c3a583329e1620e862c7824249c536209b6be5e093a2b580c2fc52f660

    • SSDEEP

      24576:o2a0H/WPj+rsO6AOhaDxL/aySUYj79FcPX6t1:va0SKsOP1L/KzEP

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks